DoD 8570 IAT Certification and Requirements

/ / DoD 8570
Introduction The U.S. Department of Defense (DoD) hosts a number of directives that set out the requirements of their workforce. DoD 8570, which is titled “Information Assurance Workforce Improvement... Go on to the site to read the full article ... Read More

DoD 8570 IAM Certification and Requirements

/ / DoD 8570
Introduction The U.S. Department of Defense (DoD) directive 8570, which is titled “Information Assurance Workforce Improvement Program,” outlines the expectations for training, certification, and... Go on to the site to read the full article ... Read More

Security and Privacy Awareness in the Age of Facebook

/ / General Security
Introduction The recent events that highlighted the privacy violations of Facebook and Cambridge Analytica will go down in history, and not in a good way. The basic problem boils down to Facebook... Go on to the site to read the full article ... Read More

The Ultimate Guide to ISACA Certifications

/ / General Security
Introduction Whatever career you chose in life, you need to prove your qualifications. In the IT industry there are a number of organizations that can help you prove your ability to do your job, not... Go on to the site to read the full article ... Read More

How to Prevent BEC with Security Awareness Training

Introduction The crime of business email compromise (BEC), which targets a business to facilitate financial theft, is expected to cost business more than $9 billion by the end of 2018. These scams... Go on to the site to read the full article ... Read More

The Ultimate Guide to EC-Council Certifications

/ / General Security
Introduction Of the top-ten most valuable companies, four of them are in technology and the rest are based on technology. Out of this explosion of tech and the digitization of industry, we have also... Go on to the site to read the full article ... Read More

A Security Pro’s Guide to CompTIA Certifications

/ / General Security
The IT industry needs knowledgeable people to ride the wave of digital transformation across industry, especially people with Cloud computing, server virtualization and cybersecurity skills. One of... Go on to the site to read the full article ... Read More
5 Social Media Site Privacy Issues You Should Worry About

5 Social Media Site Privacy Issues You Should Worry About

Introduction I recently took my Amazon Alexa device to a friend’s home so they could see what I had been going on about for months. The friend and her husband, both millennials, instantly reacted... Go on to the site to read the full article ... Read More
10 Questions You Should Ask Vendors About Their Risk Management Program

10 Questions You Should Ask Vendors About Their Risk Management Program

Our supply chains are becoming ever more complex, not only in terms of the intricate web of suppliers and sub-suppliers, but also in the technologies used within the network. Supply chains may be... Go on to the site to read the full article ... Read More
How to Assess & Manage Third-Party Vendor Security Risks

How to Assess & Manage Third-Party Vendor Security Risks

One of the most famous and largest cyberattacks of all time was the Target breach of 2013. The attack exposed the data records of more than 70 million people and payment card data for 41 million... Go on to the site to read the full article ... Read More
Loading...